Save the link somewhere safe as it also serves as a public key which is unique to identify EurAsia. You need either the Tor Browser or Tor (standalone) installed to access our onion URL linked above. You can download the needed tools and find more information at the official Tor Project website.

What the hidden service provide is decent anonymity through forward secrecy using relays over the Tor network and an additional layer providing a tunnel via TLS encryption point-to-point between the user and our web server. The last part is similar to HTTPS but doesn't rely on a broken system with compromised cert authorities where it is possible to spoof protected websites.

Note that in order to download properly over the Tor network when accessing our download section you need to click on the icon next to the file title, clicking the title text link will fail since it uses FTP.

I have tested most of the EurAsia website general functionality using the hidden service such as the download section, forums, wiki, online shop, and it seems to work OK.

Been a long time customer of Robert's. Just went out of my way to make a new account, now that the site is accessibe via the deep web. Seeing as nobody else commented yet here, I just wanted to make it known that I'm very happy to see Eurasia set up a hidden services url. This not only gives customer's an extra layer of security, but also will help in the event the clear net site ever goes down for any reason, considering the grey market stuff available here . Keep up the asweome work Robert! I will continue to purchase from youj via the .onion link from now on using BTC. I really hope you keep the hidden service going. If other's are as enthusiastic about this as I am, speak up!

No problem, you deserve it for all ypur hard work. How many other scene websites have been around without domain hopping and/or changong for well over a decafe. Few and far between.also your product knowledge is inctedible, because you actually use the stuff yoursekf too instead of just selling it like some other shops, so if i ever have a technocal question about something, you always email me back with a vrry helpful and knowledgable response

In case anyone using the hidden service through Tor local socks proxy (as opposed to the Tor browser) is worried that their browser still regards the page as "Not secure", that is because the browser only detects HTTPS (and evaluates the CA cert security wise).

When you are using a Tor socks proxy on your localhost (eg. 127.0.0.1:9050) and connecting to the EurAsia hidden service through wrqgfbrcgttkp6pi.onion you have an encrypted tunnel all the way from your client to the web server. The unsecure HTTP connection in this case is only between localhost and the Tor deamon running on the same host, this is true for the server side as well.

There are websites with Tor hidden service who accept HTTPS within the already encrypted Tor session, besides being unnecessary it compromises the privacy by relying on CA cert authorities, so I decided not to do that.

A bit off topic, but somewhat related...

Currently over half of the HTTPS websites out there with high traffic are using Cloudflare which effectively is a "man in the middle" (MITM) of the secure session. Also, there is no notification visible to the browser user that their HTTPS session goes through Cloudflare before reaching the target website (as seen in browser URL), it will still be regarded as "Secure connection" by the browser.

Why am I concerned about this? Because if Cloudflare is compromised (which it already has been, do a search for 'cloudbleed', or read this post), either by hacking or under gag order from US government, then your connection is not secure while the browser still happily reports it as "Secure connection".

In effects, Cloudbleed is similar to the 2014 Heartbleed bug in allowing unauthorized third parties to access data in the memory of programs running on web servers, including data shielded by TLS. The extent of Cloudbleed also could have impacted as many users as Heartbleed since it affected a security and content delivery service used by close to 2 million websites.

Please note when accessing the EurAsia website via Tor hidden services (or "rendezvous points" as they call it now), then make sure you actually use Tor or the Tor browser from https://www.torproject.org/.

There are lots of proxies out there for Tor hidden service sites which usually show up during searches. These HTTP/HTTPS proxies end up with names like "wrqgfbrcgttkp6pi.onion.xxx/" in tbe browser where 'xxx' can be anything. Whatever you enter or do through a proxy like this can be seen/logged by the proxy server admin, effectively a "man in the middle" (MITM), they can grab login details or anything they want, so don't use it.

Unfortunately the login icon...

...will be shown when using a proxy like this, because the system can only detect that you are using Tor hidden service from server side. When using a proxy it will only be secure between the proxy server and the EurAsia server, the connection between you and the proxy server is compromised, in other words you are at the mercy of the proxy operator/admin.